Analysis

  • max time kernel
    97s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 03:42

General

  • Target

    c0d202bfcdcd8721f6ca79d5ca13d534ea0804db5d29d6cff5690a915ef39748.exe

  • Size

    690KB

  • MD5

    1e7ceb0b1064b1fdc5dd4b8be3e95e4a

  • SHA1

    3ab6284f675ae11659e4be914d639a6a915ce670

  • SHA256

    c0d202bfcdcd8721f6ca79d5ca13d534ea0804db5d29d6cff5690a915ef39748

  • SHA512

    4a59c1152950d0337e6072cd23ff62023eac87a4f0d7f9bb8298ab962184c305b5282c51ce7c0ce2079188cd10d9a7316abf177b4459d35e500d851d58cb931b

  • SSDEEP

    12288:qMr0y90OCq2LqjFNQGH7CpLARW3GbZ9+LD4v/vNFg1figTMG/BgOlms:6yK2jFNKpsMG6D4v/fg1agTMOlms

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0d202bfcdcd8721f6ca79d5ca13d534ea0804db5d29d6cff5690a915ef39748.exe
    "C:\Users\Admin\AppData\Local\Temp\c0d202bfcdcd8721f6ca79d5ca13d534ea0804db5d29d6cff5690a915ef39748.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5036
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un735184.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un735184.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:892
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6380.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6380.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1752
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1752 -s 1080
          4⤵
          • Program crash
          PID:1400
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0163.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0163.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3872
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 1848
          4⤵
          • Program crash
          PID:4748
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si574696.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si574696.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3280
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1752 -ip 1752
    1⤵
      PID:560
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3872 -ip 3872
      1⤵
        PID:440

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si574696.exe

        Filesize

        175KB

        MD5

        6dc6d4152b393dc8565609d891123c4e

        SHA1

        f098e061f15cef2b48f3f4c5db8428ad9ece5b06

        SHA256

        f92f97e4afc819e3a665795b24a3ac711ff25bda92b27fe0cfaa2ee882904609

        SHA512

        9eb43bc70e47be4b171e0a13263f62d2dacc0718dbed4205d9d6abe7ebdeb9ed7fc511bc0b169a2c5ae9003753788657425a4b91682015524a8b17888a9e2419

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si574696.exe

        Filesize

        175KB

        MD5

        6dc6d4152b393dc8565609d891123c4e

        SHA1

        f098e061f15cef2b48f3f4c5db8428ad9ece5b06

        SHA256

        f92f97e4afc819e3a665795b24a3ac711ff25bda92b27fe0cfaa2ee882904609

        SHA512

        9eb43bc70e47be4b171e0a13263f62d2dacc0718dbed4205d9d6abe7ebdeb9ed7fc511bc0b169a2c5ae9003753788657425a4b91682015524a8b17888a9e2419

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un735184.exe

        Filesize

        548KB

        MD5

        25c795085d6a3671fca4f0e9f3b8f4d9

        SHA1

        7f55aa236541184c63c49aedafaf5dda66910958

        SHA256

        18580d3351f68d2abf52b7ff9de9d7f68c7663935bb7267576a53de22a2ae9b9

        SHA512

        24b9d03d04fb8d5c755be7031a2659626d123d72b6e712d5b6c61efb069faa9f2bdb5b3c1cb9a49055fe12bdfafdfb107fcd80f8cd5b6ae850d39ff4524f0340

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un735184.exe

        Filesize

        548KB

        MD5

        25c795085d6a3671fca4f0e9f3b8f4d9

        SHA1

        7f55aa236541184c63c49aedafaf5dda66910958

        SHA256

        18580d3351f68d2abf52b7ff9de9d7f68c7663935bb7267576a53de22a2ae9b9

        SHA512

        24b9d03d04fb8d5c755be7031a2659626d123d72b6e712d5b6c61efb069faa9f2bdb5b3c1cb9a49055fe12bdfafdfb107fcd80f8cd5b6ae850d39ff4524f0340

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6380.exe

        Filesize

        291KB

        MD5

        7e6c8abc4e1a5549b1d0a9a049bf6b2f

        SHA1

        804049202f5a33365f3dd78971e16895c1b153fe

        SHA256

        52ac98c48b500c2724fbcdf19a72461c5419a4ef3cf7d60d17fc528b998ec79f

        SHA512

        ae58c0108835af018fffc7fa242cf01bf52b1bb7c3cd7f96664570f1fe7a87b533e3a895041462574c6a6df9a087fa30a197be13f9404be9dcfc104f733c9297

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6380.exe

        Filesize

        291KB

        MD5

        7e6c8abc4e1a5549b1d0a9a049bf6b2f

        SHA1

        804049202f5a33365f3dd78971e16895c1b153fe

        SHA256

        52ac98c48b500c2724fbcdf19a72461c5419a4ef3cf7d60d17fc528b998ec79f

        SHA512

        ae58c0108835af018fffc7fa242cf01bf52b1bb7c3cd7f96664570f1fe7a87b533e3a895041462574c6a6df9a087fa30a197be13f9404be9dcfc104f733c9297

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0163.exe

        Filesize

        345KB

        MD5

        2c4b34e6da86e2aeb24ab2b579314cdf

        SHA1

        3a2a8dc3d87dc1c6b5304a56aabf3ce17c055a85

        SHA256

        619fb0bd44b859b06b96e6b826bcd47672f73f20b4c23edad954f57c4558f23e

        SHA512

        2cdc2f51a91af6178481688371916ba24251919935e40a7f5a9aefc3cce1a0bded8b4c250ac7886c02b2082c22fc37f790c8a7e5369626b20e69b1463f1fbddf

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0163.exe

        Filesize

        345KB

        MD5

        2c4b34e6da86e2aeb24ab2b579314cdf

        SHA1

        3a2a8dc3d87dc1c6b5304a56aabf3ce17c055a85

        SHA256

        619fb0bd44b859b06b96e6b826bcd47672f73f20b4c23edad954f57c4558f23e

        SHA512

        2cdc2f51a91af6178481688371916ba24251919935e40a7f5a9aefc3cce1a0bded8b4c250ac7886c02b2082c22fc37f790c8a7e5369626b20e69b1463f1fbddf

      • memory/1752-159-0x0000000002610000-0x0000000002622000-memory.dmp

        Filesize

        72KB

      • memory/1752-169-0x0000000002610000-0x0000000002622000-memory.dmp

        Filesize

        72KB

      • memory/1752-150-0x00000000007F0000-0x000000000081D000-memory.dmp

        Filesize

        180KB

      • memory/1752-151-0x0000000002610000-0x0000000002622000-memory.dmp

        Filesize

        72KB

      • memory/1752-154-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

        Filesize

        64KB

      • memory/1752-155-0x0000000002610000-0x0000000002622000-memory.dmp

        Filesize

        72KB

      • memory/1752-152-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

        Filesize

        64KB

      • memory/1752-157-0x0000000002610000-0x0000000002622000-memory.dmp

        Filesize

        72KB

      • memory/1752-148-0x0000000004ED0000-0x0000000005474000-memory.dmp

        Filesize

        5.6MB

      • memory/1752-161-0x0000000002610000-0x0000000002622000-memory.dmp

        Filesize

        72KB

      • memory/1752-163-0x0000000002610000-0x0000000002622000-memory.dmp

        Filesize

        72KB

      • memory/1752-165-0x0000000002610000-0x0000000002622000-memory.dmp

        Filesize

        72KB

      • memory/1752-167-0x0000000002610000-0x0000000002622000-memory.dmp

        Filesize

        72KB

      • memory/1752-149-0x0000000002610000-0x0000000002622000-memory.dmp

        Filesize

        72KB

      • memory/1752-171-0x0000000002610000-0x0000000002622000-memory.dmp

        Filesize

        72KB

      • memory/1752-173-0x0000000002610000-0x0000000002622000-memory.dmp

        Filesize

        72KB

      • memory/1752-175-0x0000000002610000-0x0000000002622000-memory.dmp

        Filesize

        72KB

      • memory/1752-177-0x0000000002610000-0x0000000002622000-memory.dmp

        Filesize

        72KB

      • memory/1752-179-0x0000000002610000-0x0000000002622000-memory.dmp

        Filesize

        72KB

      • memory/1752-180-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/1752-183-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

        Filesize

        64KB

      • memory/1752-182-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

        Filesize

        64KB

      • memory/1752-184-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

        Filesize

        64KB

      • memory/1752-185-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/3280-1119-0x0000000000420000-0x0000000000452000-memory.dmp

        Filesize

        200KB

      • memory/3280-1121-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

        Filesize

        64KB

      • memory/3280-1120-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

        Filesize

        64KB

      • memory/3872-193-0x0000000005FE0000-0x000000000601F000-memory.dmp

        Filesize

        252KB

      • memory/3872-195-0x0000000005FE0000-0x000000000601F000-memory.dmp

        Filesize

        252KB

      • memory/3872-197-0x0000000005FE0000-0x000000000601F000-memory.dmp

        Filesize

        252KB

      • memory/3872-201-0x0000000006140000-0x0000000006150000-memory.dmp

        Filesize

        64KB

      • memory/3872-200-0x0000000005FE0000-0x000000000601F000-memory.dmp

        Filesize

        252KB

      • memory/3872-203-0x0000000005FE0000-0x000000000601F000-memory.dmp

        Filesize

        252KB

      • memory/3872-199-0x0000000001A30000-0x0000000001A7B000-memory.dmp

        Filesize

        300KB

      • memory/3872-204-0x0000000006140000-0x0000000006150000-memory.dmp

        Filesize

        64KB

      • memory/3872-206-0x0000000005FE0000-0x000000000601F000-memory.dmp

        Filesize

        252KB

      • memory/3872-208-0x0000000005FE0000-0x000000000601F000-memory.dmp

        Filesize

        252KB

      • memory/3872-210-0x0000000005FE0000-0x000000000601F000-memory.dmp

        Filesize

        252KB

      • memory/3872-212-0x0000000005FE0000-0x000000000601F000-memory.dmp

        Filesize

        252KB

      • memory/3872-214-0x0000000005FE0000-0x000000000601F000-memory.dmp

        Filesize

        252KB

      • memory/3872-216-0x0000000005FE0000-0x000000000601F000-memory.dmp

        Filesize

        252KB

      • memory/3872-218-0x0000000005FE0000-0x000000000601F000-memory.dmp

        Filesize

        252KB

      • memory/3872-220-0x0000000005FE0000-0x000000000601F000-memory.dmp

        Filesize

        252KB

      • memory/3872-222-0x0000000005FE0000-0x000000000601F000-memory.dmp

        Filesize

        252KB

      • memory/3872-224-0x0000000005FE0000-0x000000000601F000-memory.dmp

        Filesize

        252KB

      • memory/3872-226-0x0000000005FE0000-0x000000000601F000-memory.dmp

        Filesize

        252KB

      • memory/3872-1099-0x0000000006800000-0x0000000006E18000-memory.dmp

        Filesize

        6.1MB

      • memory/3872-1100-0x0000000006E20000-0x0000000006F2A000-memory.dmp

        Filesize

        1.0MB

      • memory/3872-1101-0x0000000006F50000-0x0000000006F62000-memory.dmp

        Filesize

        72KB

      • memory/3872-1102-0x0000000006F70000-0x0000000006FAC000-memory.dmp

        Filesize

        240KB

      • memory/3872-1103-0x0000000006140000-0x0000000006150000-memory.dmp

        Filesize

        64KB

      • memory/3872-1104-0x0000000007260000-0x00000000072F2000-memory.dmp

        Filesize

        584KB

      • memory/3872-1105-0x0000000007300000-0x0000000007366000-memory.dmp

        Filesize

        408KB

      • memory/3872-1107-0x0000000007B00000-0x0000000007B76000-memory.dmp

        Filesize

        472KB

      • memory/3872-1108-0x0000000007B90000-0x0000000007BE0000-memory.dmp

        Filesize

        320KB

      • memory/3872-1109-0x0000000006140000-0x0000000006150000-memory.dmp

        Filesize

        64KB

      • memory/3872-1110-0x0000000006140000-0x0000000006150000-memory.dmp

        Filesize

        64KB

      • memory/3872-191-0x0000000005FE0000-0x000000000601F000-memory.dmp

        Filesize

        252KB

      • memory/3872-190-0x0000000005FE0000-0x000000000601F000-memory.dmp

        Filesize

        252KB

      • memory/3872-1111-0x0000000007C10000-0x0000000007DD2000-memory.dmp

        Filesize

        1.8MB

      • memory/3872-1112-0x0000000007DE0000-0x000000000830C000-memory.dmp

        Filesize

        5.2MB

      • memory/3872-1113-0x0000000006140000-0x0000000006150000-memory.dmp

        Filesize

        64KB